{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:17:16Z","timestamp":1648772236600},"reference-count":13,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2009,6,2]]},"DOI":"10.1080\/19393550902926053","type":"journal-article","created":{"date-parts":[[2009,5,29]],"date-time":"2009-05-29T09:52:07Z","timestamp":1243590727000},"page":"131-138","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Modular Squaring Algorithms for Hardware Implementation in GF(<i>p<\/i>)"],"prefix":"10.1080","volume":"18","author":[{"given":"Lo'ai","family":"Tawalbeh","sequence":"first","affiliation":[{"name":"a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan"}]},{"given":"Saed","family":"Swedan","sequence":"additional","affiliation":[{"name":"a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan"}]},{"given":"Adnan","family":"Gutub","sequence":"additional","affiliation":[{"name":"b Computer Engineering Department , King Fahd University of Petroleum and Minerals , Dhahran, Saudi Arabia"}]}],"member":"301","published-online":{"date-parts":[[2009,5,28]]},"reference":[{"issue":"2","key":"CIT0001","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"Adleman L.","year":"1978","journal-title":"Comm. of the ACM"},{"key":"CIT0002","first-page":"311","author":"Barrett P.","year":"1986","journal-title":"CRYPTO"},{"issue":"4","key":"CIT0003","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1147\/sj.294.0526","volume":"29","author":"Comba P. G.","year":"1990","journal-title":"J-IBM-SYS-J"},{"key":"CIT0004","unstructured":"Digital Signature Standard . 2000. Washington, DC: National Institute of Standards and Technology."},{"issue":"4","key":"CIT0005","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"3","author":"ElGamal T.","year":"1998","journal-title":"IEEE Transactions on Information Theory"},{"key":"CIT0006","volume-title":"Design and implementation of high-speed algorithms for public key cryptosystems","author":"George J.","year":"2005"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"Hellman M. E.","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"CIT0008","volume-title":"An exception handling model and its application to the multiple-precision integer library","author":"Hseih P.Y.","year":"2003"},{"key":"CIT0009","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/3-540-68339-9_15","volume":"1070","author":"Hong S. M.","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"CIT0010","first-page":"595","volume":"7","author":"Karatsuba A.","year":"1963","journal-title":"Soviet Physics Doklady"},{"key":"CIT0011","volume-title":"Technical Report TR 201","author":"KO\u00c7 \u00c7K.","year":"1994"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"CIT0013","first-page":"1","volume-title":"Annual Conference on Taiwan INTERNET (2006TANET)","author":"Wu C. L."}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550902926053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T08:19:23Z","timestamp":1558340363000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393550902926053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,28]]},"references-count":13,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2009,5,28]]},"published-print":{"date-parts":[[2009,6,2]]}},"alternative-id":["10.1080\/19393550902926053"],"URL":"https:\/\/doi.org\/10.1080\/19393550902926053","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,28]]}}}